My Account Log in

1 option

Cryptographic Hardware and Embedded Systems -- CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings / edited by Emmanuel Prouff, Patrick R. Schaumont.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Prouff, Emmanuel, editor.
Schaumont, Patrick R. (Patrick Robert), editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 7428.
Security and Cryptology ; 7428
Language:
English
Subjects (All):
Data encryption (Computer science).
Coding theory.
Information theory.
Data structures (Computer science).
Computer security.
Algorithms.
Computer science--Mathematics.
Computer science.
Cryptology.
Coding and Information Theory.
Data Structures and Information Theory.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Local Subjects:
Cryptology.
Coding and Information Theory.
Data Structures and Information Theory.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Physical Description:
1 online resource (XVII, 562 pages) : 189 illustrations.
Edition:
First edition 2012.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
Contents:
Intrusive Attacks and Countermeasures
Masking
Improved Fault Attacks and Side Channel Analysis
Leakage Resiliency and Security Analysis
Physically Unclonable Functions
Efficient Implementations
Lightweight Cryptography
We Still Love RSA
Hardware Implementations.
Other Format:
Printed edition:
ISBN:
978-3-642-33027-8
9783642330278
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account